A number of people pointed out the Key Katcher at ThinkGeek to me yesterday. I”d love to get my hands on one of these to try it out, but it seems very simple. I wondered how long it would take the average user to generate 130,000 keystrokes – how easy or frequent does rerieval need to be if you’re hoping to catch a password?
Of course, the product description doesn’t mention that as a use, focusing on putting it on your own machine to identify if an unauthorized user accessed it, or for sys admins to use to see what exactly triggered a problem.
Spirit in safety
If you’ve been following the Mars Rover news at all lately, you’ll be excited to hear that, desipte its broken wheel and having to drive backwards, Spirit has reached a hill that will get enough sun to power the rover all winter. In addition, they think that there may be some interesting science to do in its resting spot, and will be able to keep the rover busy without risking moving it during the short winter days.
Exterrestrial Bed Coverings
I’ve been meaning to look into how the image search engine Pixsy actually works, as it’s been getting a lot of attention. I poked around on their site and couldn’t find any explanation of their methods, but from trying out some searches, it doesn’t appear that they are doing any actual image processing, just doing text processing for text and tags in proiximity to images they are indexing.
This theory is supported by my discovery that the top 5 out of 12 image results on the query term “ufo” are pictures of quilts. Which absolutely cracks me up in how right, and yet wrong, they are.
Interestingly, the first 500 images returned in Google’s image search contain many weird things, but no craft-project pictures. I am undecided about whether this makes me like Google search more or less.
OMG!!! Ponies!!!
I do not like personal April Fools Day pranks, but I do enjoy the inevitable internet hoaxes and website redesigns. I ran into a couple yesterday just surfing around, but it turns out that Wikipedia has an entry listing 2006 April Fool’s hoaxes, including a link to a screenshot of my favorite (even though I feel a little guilty for finding it so funny). If you scroll to the bottom, you can find entries on the notable April Fool’s hoaxes from the past six years as well.
Two Faces of Design
I originally intended just to point out this interesting post about the success of “ugly” design, arguing that unattractive sites such as del.icio.us are successful because the lack of design communicates to the user a lack of marketing or corporate influence.
But then I found a response to the conversation that I liked even more: disambiguity’s separating of information/interaction design from visual design. And, having just talked to one of my classes about the distinction between logical versus physical tags and why one might use one over the other, I liked seeing the point made that a site with good information and interaction design but poor visual design can succeed (and the ugly design examples given in the first link would fall in that catagory) whereas good visual design without good information and interaction design will fail. Of course, the ideal is to have both, but what this conversation is really about is the fact that it is rare to have both, and so there is a clear prefernce for which to focus on, if you will only do one.
Also worth reading is the contrast of the old and redesigned Craig’s List at the bottom of the disambiguity article.
Data Security Legislation
The ACM technology policy weblog has a nice summary of and response to H.R. 4127 regarding stronger data security requirements for businesses. The highlights include requiring data security plans and notification if security is breached.
But be sure to scan down for their discussion of the exemption from notification if the compromised data is encrypted, and why this is a dangerous loophole.
It reminds me of a recent experience talking about security principles to a general audience – one of the hardest concepts to get them to accept was the idea that redundant or layered security is necessary, and single potential points of failure must be avoided. There is definitely a perception that there should be some tool or technique for ensuring security. Here, data encryption seems to be the magic bullet.
Shredding Required
In a confluence of information-security news and a new update from Cockeyed.com, the recommendation to “tear up” an unwanted credit card application is tested and found to be wanting. I’ve been reading this site for years, so I’m included to believe the story, though I am shocked that they would accept a torn-up and taped-together application. The bit about changing the address and phone number on the original is brilliant too, though if his parents’ address is on his credit history from an old account or something, it slightly mediates the horror of the thing (but not my much). Either way, it’s a phenomenal failure of security on the part of the credit card company. Makes me glad I invested in a decent cross-cut shredder.
But what kind of tea…..
A recent article discusses the goal of building AI that anticipates user desires, opening with the following teaser:
MANY viewers were probably impressed when a character on Star Trek asked a computer for a cup of tea and it was produced immediately.
Not Kristian Hammond. “I wondered why he had to ask,” says Hammond, co-director of America’s Northwestern University intelligent information computer lab. “A truly intelligent machine would anticipate that its operator wanted tea.”
If you read the rest of the article, you see that their actual project is a bit more sensible in scope, looking at how AI can refine information search and extraction based on contextual knowledge about a user – either historical or current. It’s particularly interesting that there seems to be interest in having the tool search out information about the user as well to inform the refinement process. But after the introduction to the article, I couldn’t help but think of the following quote from Hitchhiker’s Guide to the Galaxy about the Nutrimatic drink dispenser:
When the ‘Drink’ button is pressed it makes an instant but highly detailed examination of the subject’s taste buds, a spectroscopic analysis of the subject’s metabolism, and then sends tiny experimental signals down the neural pathways to the taste centres of the subject’s brain to see what is likely to be well received. However, no-one knows quite why it does this because it then invariably delivers a cupful of liquid that is almost, but not quite, entirely unlike tea.
Google spreads further afield
Like Google Earth, but with fewer roads so far (though, you can check up on the locations of Spirit and Opportunity): Google Mars! Check out both an elevation-shaded and an actual image at an impressive range of zooms. At this point only covers a limited chunk of the western hemisphere. They hope to tie it into the Google Earth client in the future to allow fly-throughs and such.
Text Creation
If you aren’t familiar with the process by which a textbook is created, I highly recommend this “Confessions of a Textbook Editor” article from a couple of years ago. It’s a short snapshot of the considerations that come into play, and the degree to which content is selected in order to avoid controversy from anyone. If you are interested in the topic, I recommend What Johnny Shouldn’t Read: Textbook Censorship in America by Joan Delfattore which I reviewed back in 2002, the book itself being even older than that. It seems the textbook industry has been pretty consistent over the past decade.